General
-
Target
a92bbb7c5c81408764e5c648b1b27e6315f177295f74f2bc56df30be79056825.exe
-
Size
576KB
-
Sample
241222-art11swlcj
-
MD5
1cfbbfa5376d5d95f2fec87308a15df3
-
SHA1
5bd8020c0c508c298ee24d486ce2e838f0b77fe2
-
SHA256
a92bbb7c5c81408764e5c648b1b27e6315f177295f74f2bc56df30be79056825
-
SHA512
7fb6eb6e01dcf1c481fa73c92e5026d6f5c8dc74d4f210b7a310883508d4c9966fffdbc620d0f0d4a07fe1346ac26e496096fba3650c130a2518bbbed417d0ef
-
SSDEEP
12288:+NWPkHlUkErBuxQ4uzi6d6dL/yiXLzeMdK6io8levy0FhVlpzkzDDoSk:+NWPkHlUfBgpuPdWzyuDTifgyWl/
Behavioral task
behavioral1
Sample
a92bbb7c5c81408764e5c648b1b27e6315f177295f74f2bc56df30be79056825.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
a92bbb7c5c81408764e5c648b1b27e6315f177295f74f2bc56df30be79056825.exe
-
Size
576KB
-
MD5
1cfbbfa5376d5d95f2fec87308a15df3
-
SHA1
5bd8020c0c508c298ee24d486ce2e838f0b77fe2
-
SHA256
a92bbb7c5c81408764e5c648b1b27e6315f177295f74f2bc56df30be79056825
-
SHA512
7fb6eb6e01dcf1c481fa73c92e5026d6f5c8dc74d4f210b7a310883508d4c9966fffdbc620d0f0d4a07fe1346ac26e496096fba3650c130a2518bbbed417d0ef
-
SSDEEP
12288:+NWPkHlUkErBuxQ4uzi6d6dL/yiXLzeMdK6io8levy0FhVlpzkzDDoSk:+NWPkHlUfBgpuPdWzyuDTifgyWl/
-
Darkcomet family
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-